SUSE Security Update: Security update for ImageMagick
______________________________________________________________________________

Announcement ID:    SUSE-SU-2017:3388-1
Rating:             important
References:         #1048457 #1049796 #1050083 #1050116 #1050139 
                    #1050632 #1051441 #1051847 #1052450 #1052553 
                    #1052689 #1052744 #1052758 #1052764 #1054757 
                    #1055214 #1056432 #1057157 #1057719 #1057729 
                    #1057730 #1058485 #1058637 #1059666 #1059778 
                    #1060176 #1060577 #1061254 #1062750 #1066003 
                    #1067181 #1067184 #1067409 
Cross-References:   CVE-2017-11188 CVE-2017-11478 CVE-2017-11523
                    CVE-2017-11527 CVE-2017-11535 CVE-2017-11640
                    CVE-2017-11752 CVE-2017-12140 CVE-2017-12435
                    CVE-2017-12587 CVE-2017-12644 CVE-2017-12662
                    CVE-2017-12669 CVE-2017-12983 CVE-2017-13134
                    CVE-2017-13769 CVE-2017-14138 CVE-2017-14172
                    CVE-2017-14173 CVE-2017-14175 CVE-2017-14341
                    CVE-2017-14342 CVE-2017-14531 CVE-2017-14607
                    CVE-2017-14682 CVE-2017-14733 CVE-2017-14989
                    CVE-2017-15217 CVE-2017-15930 CVE-2017-16545
                    CVE-2017-16546 CVE-2017-16669
Affected Products:
                    SUSE Linux Enterprise Workstation Extension 12-SP3
                    SUSE Linux Enterprise Workstation Extension 12-SP2
                    SUSE Linux Enterprise Software Development Kit 12-SP3
                    SUSE Linux Enterprise Software Development Kit 12-SP2
                    SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
                    SUSE Linux Enterprise Server 12-SP3
                    SUSE Linux Enterprise Server 12-SP2
                    SUSE Linux Enterprise Desktop 12-SP3
                    SUSE Linux Enterprise Desktop 12-SP2
______________________________________________________________________________

   An update that solves 32 vulnerabilities and has one errata
   is now available.

Description:

   This update for ImageMagick fixes the following issues:

     * CVE-2017-14989: use-after-free in RenderFreetype in
       MagickCore/annotate.c could lead to denial of service [bsc#1061254]
     * CVE-2017-14682: GetNextToken in MagickCore/token.c heap buffer
       overflow could lead to denial of service [bsc#1060176]
     * Memory leak in WriteINLINEImage in coders/inline.c could lead to
       denial of service [bsc#1052744]
     * CVE-2017-14607: out of bounds read flaw related to ReadTIFFImagehas
       could possibly disclose potentially sensitive memory [bsc#1059778]
     * CVE-2017-11640: NULL pointer deref in WritePTIFImage() in
       coders/tiff.c [bsc#1050632]
     * CVE-2017-14342: a memory exhaustion vulnerability in ReadWPGImage in
       coders/wpg.c could lead to denial of service [bsc#1058485]
     * CVE-2017-14341: Infinite loop in the ReadWPGImage function
       [bsc#1058637]
     * CVE-2017-16546: problem in the function ReadWPGImage in coders/wpg.c
       could lead to denial of service [bsc#1067181]
     * CVE-2017-16545: The ReadWPGImage function in coders/wpg.c in
       validation problems could lead to denial of service [bsc#1067184]
     * CVE-2017-16669: problem in coders/wpg.c could allow remote attackers       to cause a denial of service via crafted file [bsc#1067409]
     * CVE-2017-14175: Lack of End of File check could lead to denial of
       service [bsc#1057719]
     * CVE-2017-14138: memory leak vulnerability in ReadWEBPImage in
       coders/webp.c could lead to denial of service [bsc#1057157]
     * CVE-2017-13769: denial of service issue in function
       WriteTHUMBNAILImage in coders/thumbnail.c [bsc#1056432]
     * CVE-2017-13134: a heap-based buffer over-read was found in thefunction
       SFWScan in coders/sfw.c, which allows attackers to cause adenial of
       service via a crafted file. [bsc#1055214]
     * CVE-2017-15217: memory leak in ReadSGIImage in coders/sgi.c
       [bsc#1062750]
     * CVE-2017-11478: ReadOneDJVUImage in coders/djvu.c in ImageMagick
       allows remote attackers to cause a DoS [bsc#1049796]
     * CVE-2017-15930: Null Pointer dereference  while transfering JPEG
       scanlines could lead to denial of service [bsc#1066003]
     * CVE-2017-12983: Heap-based buffer overflow in the ReadSFWImage
       function in coders/sfw.c inImageMagick 7.0.6-8 allows remote attackers       to cause a denial of service [bsc#1054757]
     * CVE-2017-14531: memory exhaustion issue in ReadSUNImage
       incoders/sun.c. [bsc#1059666]
     * CVE-2017-12435: Memory exhaustion in ReadSUNImage in coders/sun.c,
       which allows attackers to cause denial of service [bsc#1052553]
     * CVE-2017-12587: User controlable large loop in the ReadPWPImage in
       coders\pwp.c could lead to denial of service [bsc#1052450]
     * CVE-2017-11523: ReadTXTImage in coders/txt.c allows remote attackers       to cause a denial of service [bsc#1050083]
     * CVE-2017-14173: unction ReadTXTImage is vulnerable to a integer
       overflow that could lead to denial of service [bsc#1057729]
     * CVE-2017-11188: ImageMagick: The ReadDPXImage function in codersdpx.c
       in ImageMagick 7.0.6-0 has a largeloop vulnerability that can cause
       CPU exhaustion via a crafted DPX file, relatedto lack of an EOF check.
       [bnc#1048457]
     * CVE-2017-11527: ImageMagick: ReadDPXImage in coders/dpx.c allows
       remote attackers to cause DoS [bnc#1050116]
     * CVE-2017-11535: GraphicsMagick, ImageMagick: Heap-based buffer
       over-read in WritePSImage() in coders/ps.c [bnc#1050139]
     * CVE-2017-11752: ImageMagick: ReadMAGICKImage in coders/magick.c allows
       to cause DoS  [bnc#1051441]
     * CVE-2017-12140: ImageMagick: ReadDCMImage in codersdcm.c has a
       ninteger signedness error leading to excessive memory consumption
       [bnc#1051847]
     * CVE-2017-12669: ImageMagick: Memory leak in WriteCALSImage in
       coders/cals.c [bnc#1052689]
     * CVE-2017-12662: GraphicsMagick, ImageMagick: Memory leak in
       WritePDFImage in coders/pdf.c [bnc#1052758]
     * CVE-2017-12644: ImageMagick: Memory leak in ReadDCMImage in
       codersdcm.c [bnc#1052764]
     * CVE-2017-14172: ImageMagick: Lack of end of file check in
       ReadPSImage() could lead to a denial of service [bnc#1057730]
     * CVE-2017-14733: GraphicsMagick: Heap overflow on ReadRLEImage in
       coders/rle.c could lead to denial of service [bnc#1060577]


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Workstation Extension 12-SP3:

      zypper in -t patch SUSE-SLE-WE-12-SP3-2017-2123=1

   - SUSE Linux Enterprise Workstation Extension 12-SP2:

      zypper in -t patch SUSE-SLE-WE-12-SP2-2017-2123=1

   - SUSE Linux Enterprise Software Development Kit 12-SP3:

      zypper in -t patch SUSE-SLE-SDK-12-SP3-2017-2123=1

   - SUSE Linux Enterprise Software Development Kit 12-SP2:

      zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-2123=1

   - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:

      zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-2123=1

   - SUSE Linux Enterprise Server 12-SP3:

      zypper in -t patch SUSE-SLE-SERVER-12-SP3-2017-2123=1

   - SUSE Linux Enterprise Server 12-SP2:

      zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-2123=1

   - SUSE Linux Enterprise Desktop 12-SP3:

      zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2017-2123=1

   - SUSE Linux Enterprise Desktop 12-SP2:

      zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-2123=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Workstation Extension 12-SP3 (x86_64):

      ImageMagick-6.8.8.1-71.17.1
      ImageMagick-debuginfo-6.8.8.1-71.17.1
      ImageMagick-debugsource-6.8.8.1-71.17.1
      libMagick++-6_Q16-3-6.8.8.1-71.17.1
      libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.17.1
      libMagickCore-6_Q16-1-32bit-6.8.8.1-71.17.1
      libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-71.17.1

   - SUSE Linux Enterprise Workstation Extension 12-SP2 (x86_64):

      ImageMagick-6.8.8.1-71.17.1
      ImageMagick-debuginfo-6.8.8.1-71.17.1
      ImageMagick-debugsource-6.8.8.1-71.17.1
      libMagick++-6_Q16-3-6.8.8.1-71.17.1
      libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.17.1
      libMagickCore-6_Q16-1-32bit-6.8.8.1-71.17.1
      libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-71.17.1

   - SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 ppc64le s390x x86_64):

      ImageMagick-6.8.8.1-71.17.1
      ImageMagick-debuginfo-6.8.8.1-71.17.1
      ImageMagick-debugsource-6.8.8.1-71.17.1
      ImageMagick-devel-6.8.8.1-71.17.1
      libMagick++-6_Q16-3-6.8.8.1-71.17.1
      libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.17.1
      libMagick++-devel-6.8.8.1-71.17.1
      perl-PerlMagick-6.8.8.1-71.17.1
      perl-PerlMagick-debuginfo-6.8.8.1-71.17.1

   - SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64):

      ImageMagick-6.8.8.1-71.17.1
      ImageMagick-debuginfo-6.8.8.1-71.17.1
      ImageMagick-debugsource-6.8.8.1-71.17.1
      ImageMagick-devel-6.8.8.1-71.17.1
      libMagick++-6_Q16-3-6.8.8.1-71.17.1
      libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.17.1
      libMagick++-devel-6.8.8.1-71.17.1
      perl-PerlMagick-6.8.8.1-71.17.1
      perl-PerlMagick-debuginfo-6.8.8.1-71.17.1

   - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):

      ImageMagick-debuginfo-6.8.8.1-71.17.1
      ImageMagick-debugsource-6.8.8.1-71.17.1
      libMagickCore-6_Q16-1-6.8.8.1-71.17.1
      libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.17.1
      libMagickWand-6_Q16-1-6.8.8.1-71.17.1
      libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.17.1

   - SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64):

      ImageMagick-debuginfo-6.8.8.1-71.17.1
      ImageMagick-debugsource-6.8.8.1-71.17.1
      libMagickCore-6_Q16-1-6.8.8.1-71.17.1
      libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.17.1
      libMagickWand-6_Q16-1-6.8.8.1-71.17.1
      libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.17.1

   - SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le s390x x86_64):

      ImageMagick-debuginfo-6.8.8.1-71.17.1
      ImageMagick-debugsource-6.8.8.1-71.17.1
      libMagickCore-6_Q16-1-6.8.8.1-71.17.1
      libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.17.1
      libMagickWand-6_Q16-1-6.8.8.1-71.17.1
      libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.17.1

   - SUSE Linux Enterprise Desktop 12-SP3 (x86_64):

      ImageMagick-6.8.8.1-71.17.1
      ImageMagick-debuginfo-6.8.8.1-71.17.1
      ImageMagick-debugsource-6.8.8.1-71.17.1
      libMagick++-6_Q16-3-6.8.8.1-71.17.1
      libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.17.1
      libMagickCore-6_Q16-1-32bit-6.8.8.1-71.17.1
      libMagickCore-6_Q16-1-6.8.8.1-71.17.1
      libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-71.17.1
      libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.17.1
      libMagickWand-6_Q16-1-6.8.8.1-71.17.1
      libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.17.1

   - SUSE Linux Enterprise Desktop 12-SP2 (x86_64):

      ImageMagick-6.8.8.1-71.17.1
      ImageMagick-debuginfo-6.8.8.1-71.17.1
      ImageMagick-debugsource-6.8.8.1-71.17.1
      libMagick++-6_Q16-3-6.8.8.1-71.17.1
      libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.17.1
      libMagickCore-6_Q16-1-32bit-6.8.8.1-71.17.1
      libMagickCore-6_Q16-1-6.8.8.1-71.17.1
      libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-71.17.1
      libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.17.1
      libMagickWand-6_Q16-1-6.8.8.1-71.17.1
      libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.17.1


References:

   https://www.suse.com/security/cve/CVE-2017-11188.html
   https://www.suse.com/security/cve/CVE-2017-11478.html
   https://www.suse.com/security/cve/CVE-2017-11523.html
   https://www.suse.com/security/cve/CVE-2017-11527.html
   https://www.suse.com/security/cve/CVE-2017-11535.html
   https://www.suse.com/security/cve/CVE-2017-11640.html
   https://www.suse.com/security/cve/CVE-2017-11752.html
   https://www.suse.com/security/cve/CVE-2017-12140.html
   https://www.suse.com/security/cve/CVE-2017-12435.html
   https://www.suse.com/security/cve/CVE-2017-12587.html
   https://www.suse.com/security/cve/CVE-2017-12644.html
   https://www.suse.com/security/cve/CVE-2017-12662.html
   https://www.suse.com/security/cve/CVE-2017-12669.html
   https://www.suse.com/security/cve/CVE-2017-12983.html
   https://www.suse.com/security/cve/CVE-2017-13134.html
   https://www.suse.com/security/cve/CVE-2017-13769.html
   https://www.suse.com/security/cve/CVE-2017-14138.html
   https://www.suse.com/security/cve/CVE-2017-14172.html
   https://www.suse.com/security/cve/CVE-2017-14173.html
   https://www.suse.com/security/cve/CVE-2017-14175.html
   https://www.suse.com/security/cve/CVE-2017-14341.html
   https://www.suse.com/security/cve/CVE-2017-14342.html
   https://www.suse.com/security/cve/CVE-2017-14531.html
   https://www.suse.com/security/cve/CVE-2017-14607.html
   https://www.suse.com/security/cve/CVE-2017-14682.html
   https://www.suse.com/security/cve/CVE-2017-14733.html
   https://www.suse.com/security/cve/CVE-2017-14989.html
   https://www.suse.com/security/cve/CVE-2017-15217.html
   https://www.suse.com/security/cve/CVE-2017-15930.html
   https://www.suse.com/security/cve/CVE-2017-16545.html
   https://www.suse.com/security/cve/CVE-2017-16546.html
   https://www.suse.com/security/cve/CVE-2017-16669.html
   https://bugzilla.suse.com/1048457
   https://bugzilla.suse.com/1049796
   https://bugzilla.suse.com/1050083
   https://bugzilla.suse.com/1050116
   https://bugzilla.suse.com/1050139
   https://bugzilla.suse.com/1050632
   https://bugzilla.suse.com/1051441
   https://bugzilla.suse.com/1051847
   https://bugzilla.suse.com/1052450
   https://bugzilla.suse.com/1052553
   https://bugzilla.suse.com/1052689
   https://bugzilla.suse.com/1052744
   https://bugzilla.suse.com/1052758
   https://bugzilla.suse.com/1052764
   https://bugzilla.suse.com/1054757
   https://bugzilla.suse.com/1055214
   https://bugzilla.suse.com/1056432
   https://bugzilla.suse.com/1057157
   https://bugzilla.suse.com/1057719
   https://bugzilla.suse.com/1057729
   https://bugzilla.suse.com/1057730
   https://bugzilla.suse.com/1058485
   https://bugzilla.suse.com/1058637
   https://bugzilla.suse.com/1059666
   https://bugzilla.suse.com/1059778
   https://bugzilla.suse.com/1060176
   https://bugzilla.suse.com/1060577
   https://bugzilla.suse.com/1061254
   https://bugzilla.suse.com/1062750
   https://bugzilla.suse.com/1066003
   https://bugzilla.suse.com/1067181
   https://bugzilla.suse.com/1067184
   https://bugzilla.suse.com/1067409

SuSE: 2017:3388-1: important: ImageMagick

December 20, 2017
An update that solves 32 vulnerabilities and has one errata An update that solves 32 vulnerabilities and has one errata An update that solves 32 vulnerabilities and has one errata ...

Summary

This update for ImageMagick fixes the following issues: * CVE-2017-14989: use-after-free in RenderFreetype in MagickCore/annotate.c could lead to denial of service [bsc#1061254] * CVE-2017-14682: GetNextToken in MagickCore/token.c heap buffer overflow could lead to denial of service [bsc#1060176] * Memory leak in WriteINLINEImage in coders/inline.c could lead to denial of service [bsc#1052744] * CVE-2017-14607: out of bounds read flaw related to ReadTIFFImagehas could possibly disclose potentially sensitive memory [bsc#1059778] * CVE-2017-11640: NULL pointer deref in WritePTIFImage() in coders/tiff.c [bsc#1050632] * CVE-2017-14342: a memory exhaustion vulnerability in ReadWPGImage in coders/wpg.c could lead to denial of service [bsc#1058485] * CVE-2017-14341: Infinite loop in the ReadWPGImage function [bsc#1058637] * CVE-2017-16546: problem in the function ReadWPGImage in coders/wpg.c could lead to denial of service [bsc#1067181] * CVE-2017-16545: The ReadWPGImage function in coders/wpg.c in validation problems could lead to denial of service [bsc#1067184] * CVE-2017-16669: problem in coders/wpg.c could allow remote attackers to cause a denial of service via crafted file [bsc#1067409] * CVE-2017-14175: Lack of End of File check could lead to denial of service [bsc#1057719] * CVE-2017-14138: memory leak vulnerability in ReadWEBPImage in coders/webp.c could lead to denial of service [bsc#1057157] * CVE-2017-13769: denial of service issue in function WriteTHUMBNAILImage in coders/thumbnail.c [bsc#1056432] * CVE-2017-13134: a heap-based buffer over-read was found in thefunction SFWScan in coders/sfw.c, which allows attackers to cause adenial of service via a crafted file. [bsc#1055214] * CVE-2017-15217: memory leak in ReadSGIImage in coders/sgi.c [bsc#1062750] * CVE-2017-11478: ReadOneDJVUImage in coders/djvu.c in ImageMagick allows remote attackers to cause a DoS [bsc#1049796] * CVE-2017-15930: Null Pointer dereference while transfering JPEG scanlines could lead to denial of service [bsc#1066003] * CVE-2017-12983: Heap-based buffer overflow in the ReadSFWImage function in coders/sfw.c inImageMagick 7.0.6-8 allows remote attackers to cause a denial of service [bsc#1054757] * CVE-2017-14531: memory exhaustion issue in ReadSUNImage incoders/sun.c. [bsc#1059666] * CVE-2017-12435: Memory exhaustion in ReadSUNImage in coders/sun.c, which allows attackers to cause denial of service [bsc#1052553] * CVE-2017-12587: User controlable large loop in the ReadPWPImage in coders\pwp.c could lead to denial of service [bsc#1052450] * CVE-2017-11523: ReadTXTImage in coders/txt.c allows remote attackers to cause a denial of service [bsc#1050083] * CVE-2017-14173: unction ReadTXTImage is vulnerable to a integer overflow that could lead to denial of service [bsc#1057729] * CVE-2017-11188: ImageMagick: The ReadDPXImage function in codersdpx.c in ImageMagick 7.0.6-0 has a largeloop vulnerability that can cause CPU exhaustion via a crafted DPX file, relatedto lack of an EOF check. [bnc#1048457] * CVE-2017-11527: ImageMagick: ReadDPXImage in coders/dpx.c allows remote attackers to cause DoS [bnc#1050116] * CVE-2017-11535: GraphicsMagick, ImageMagick: Heap-based buffer over-read in WritePSImage() in coders/ps.c [bnc#1050139] * CVE-2017-11752: ImageMagick: ReadMAGICKImage in coders/magick.c allows to cause DoS [bnc#1051441] * CVE-2017-12140: ImageMagick: ReadDCMImage in codersdcm.c has a ninteger signedness error leading to excessive memory consumption [bnc#1051847] * CVE-2017-12669: ImageMagick: Memory leak in WriteCALSImage in coders/cals.c [bnc#1052689] * CVE-2017-12662: GraphicsMagick, ImageMagick: Memory leak in WritePDFImage in coders/pdf.c [bnc#1052758] * CVE-2017-12644: ImageMagick: Memory leak in ReadDCMImage in codersdcm.c [bnc#1052764] * CVE-2017-14172: ImageMagick: Lack of end of file check in ReadPSImage() could lead to a denial of service [bnc#1057730] * CVE-2017-14733: GraphicsMagick: Heap overflow on ReadRLEImage in coders/rle.c could lead to denial of service [bnc#1060577] Patch Instructions: To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Workstation Extension 12-SP3: zypper in -t patch SUSE-SLE-WE-12-SP3-2017-2123=1 - SUSE Linux Enterprise Workstation Extension 12-SP2: zypper in -t patch SUSE-SLE-WE-12-SP2-2017-2123=1 - SUSE Linux Enterprise Software Development Kit 12-SP3: zypper in -t patch SUSE-SLE-SDK-12-SP3-2017-2123=1 - SUSE Linux Enterprise Software Development Kit 12-SP2: zypper in -t patch SUSE-SLE-SDK-12-SP2-2017-2123=1 - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2: zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-2123=1 - SUSE Linux Enterprise Server 12-SP3: zypper in -t patch SUSE-SLE-SERVER-12-SP3-2017-2123=1 - SUSE Linux Enterprise Server 12-SP2: zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-2123=1 - SUSE Linux Enterprise Desktop 12-SP3: zypper in -t patch SUSE-SLE-DESKTOP-12-SP3-2017-2123=1 - SUSE Linux Enterprise Desktop 12-SP2: zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-2123=1 To bring your system up-to-date, use "zypper patch". Package List: - SUSE Linux Enterprise Workstation Extension 12-SP3 (x86_64): ImageMagick-6.8.8.1-71.17.1 ImageMagick-debuginfo-6.8.8.1-71.17.1 ImageMagick-debugsource-6.8.8.1-71.17.1 libMagick++-6_Q16-3-6.8.8.1-71.17.1 libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.17.1 libMagickCore-6_Q16-1-32bit-6.8.8.1-71.17.1 libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-71.17.1 - SUSE Linux Enterprise Workstation Extension 12-SP2 (x86_64): ImageMagick-6.8.8.1-71.17.1 ImageMagick-debuginfo-6.8.8.1-71.17.1 ImageMagick-debugsource-6.8.8.1-71.17.1 libMagick++-6_Q16-3-6.8.8.1-71.17.1 libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.17.1 libMagickCore-6_Q16-1-32bit-6.8.8.1-71.17.1 libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-71.17.1 - SUSE Linux Enterprise Software Development Kit 12-SP3 (aarch64 ppc64le s390x x86_64): ImageMagick-6.8.8.1-71.17.1 ImageMagick-debuginfo-6.8.8.1-71.17.1 ImageMagick-debugsource-6.8.8.1-71.17.1 ImageMagick-devel-6.8.8.1-71.17.1 libMagick++-6_Q16-3-6.8.8.1-71.17.1 libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.17.1 libMagick++-devel-6.8.8.1-71.17.1 perl-PerlMagick-6.8.8.1-71.17.1 perl-PerlMagick-debuginfo-6.8.8.1-71.17.1 - SUSE Linux Enterprise Software Development Kit 12-SP2 (aarch64 ppc64le s390x x86_64): ImageMagick-6.8.8.1-71.17.1 ImageMagick-debuginfo-6.8.8.1-71.17.1 ImageMagick-debugsource-6.8.8.1-71.17.1 ImageMagick-devel-6.8.8.1-71.17.1 libMagick++-6_Q16-3-6.8.8.1-71.17.1 libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.17.1 libMagick++-devel-6.8.8.1-71.17.1 perl-PerlMagick-6.8.8.1-71.17.1 perl-PerlMagick-debuginfo-6.8.8.1-71.17.1 - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64): ImageMagick-debuginfo-6.8.8.1-71.17.1 ImageMagick-debugsource-6.8.8.1-71.17.1 libMagickCore-6_Q16-1-6.8.8.1-71.17.1 libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.17.1 libMagickWand-6_Q16-1-6.8.8.1-71.17.1 libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.17.1 - SUSE Linux Enterprise Server 12-SP3 (aarch64 ppc64le s390x x86_64): ImageMagick-debuginfo-6.8.8.1-71.17.1 ImageMagick-debugsource-6.8.8.1-71.17.1 libMagickCore-6_Q16-1-6.8.8.1-71.17.1 libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.17.1 libMagickWand-6_Q16-1-6.8.8.1-71.17.1 libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.17.1 - SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le s390x x86_64): ImageMagick-debuginfo-6.8.8.1-71.17.1 ImageMagick-debugsource-6.8.8.1-71.17.1 libMagickCore-6_Q16-1-6.8.8.1-71.17.1 libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.17.1 libMagickWand-6_Q16-1-6.8.8.1-71.17.1 libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.17.1 - SUSE Linux Enterprise Desktop 12-SP3 (x86_64): ImageMagick-6.8.8.1-71.17.1 ImageMagick-debuginfo-6.8.8.1-71.17.1 ImageMagick-debugsource-6.8.8.1-71.17.1 libMagick++-6_Q16-3-6.8.8.1-71.17.1 libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.17.1 libMagickCore-6_Q16-1-32bit-6.8.8.1-71.17.1 libMagickCore-6_Q16-1-6.8.8.1-71.17.1 libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-71.17.1 libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.17.1 libMagickWand-6_Q16-1-6.8.8.1-71.17.1 libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.17.1 - SUSE Linux Enterprise Desktop 12-SP2 (x86_64): ImageMagick-6.8.8.1-71.17.1 ImageMagick-debuginfo-6.8.8.1-71.17.1 ImageMagick-debugsource-6.8.8.1-71.17.1 libMagick++-6_Q16-3-6.8.8.1-71.17.1 libMagick++-6_Q16-3-debuginfo-6.8.8.1-71.17.1 libMagickCore-6_Q16-1-32bit-6.8.8.1-71.17.1 libMagickCore-6_Q16-1-6.8.8.1-71.17.1 libMagickCore-6_Q16-1-debuginfo-32bit-6.8.8.1-71.17.1 libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.17.1 libMagickWand-6_Q16-1-6.8.8.1-71.17.1 libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.17.1

References

#1048457 #1049796 #1050083 #1050116 #1050139

#1050632 #1051441 #1051847 #1052450 #1052553

#1052689 #1052744 #1052758 #1052764 #1054757

#1055214 #1056432 #1057157 #1057719 #1057729

#1057730 #1058485 #1058637 #1059666 #1059778

#1060176 #1060577 #1061254 #1062750 #1066003

#1067181 #1067184 #1067409

Cross- CVE-2017-11188 CVE-2017-11478 CVE-2017-11523

CVE-2017-11527 CVE-2017-11535 CVE-2017-11640

CVE-2017-11752 CVE-2017-12140 CVE-2017-12435

CVE-2017-12587 CVE-2017-12644 CVE-2017-12662

CVE-2017-12669 CVE-2017-12983 CVE-2017-13134

CVE-2017-13769 CVE-2017-14138 CVE-2017-14172

CVE-2017-14173 CVE-2017-14175 CVE-2017-14341

CVE-2017-14342 CVE-2017-14531 CVE-2017-14607

CVE-2017-14682 CVE-2017-14733 CVE-2017-14989

CVE-2017-15217 CVE-2017-15930 CVE-2017-16545

CVE-2017-16546 CVE-2017-16669

Affected Products:

SUSE Linux Enterprise Workstation Extension 12-SP3

SUSE Linux Enterprise Workstation Extension 12-SP2

SUSE Linux Enterprise Software Development Kit 12-SP3

SUSE Linux Enterprise Software Development Kit 12-SP2

SUSE Linux Enterprise Server for Raspberry Pi 12-SP2

SUSE Linux Enterprise Server 12-SP3

SUSE Linux Enterprise Server 12-SP2

SUSE Linux Enterprise Desktop 12-SP3

SUSE Linux Enterprise Desktop 12-SP2

https://www.suse.com/security/cve/CVE-2017-11188.html

https://www.suse.com/security/cve/CVE-2017-11478.html

https://www.suse.com/security/cve/CVE-2017-11523.html

https://www.suse.com/security/cve/CVE-2017-11527.html

https://www.suse.com/security/cve/CVE-2017-11535.html

https://www.suse.com/security/cve/CVE-2017-11640.html

https://www.suse.com/security/cve/CVE-2017-11752.html

https://www.suse.com/security/cve/CVE-2017-12140.html

https://www.suse.com/security/cve/CVE-2017-12435.html

https://www.suse.com/security/cve/CVE-2017-12587.html

https://www.suse.com/security/cve/CVE-2017-12644.html

https://www.suse.com/security/cve/CVE-2017-12662.html

https://www.suse.com/security/cve/CVE-2017-12669.html

https://www.suse.com/security/cve/CVE-2017-12983.html

https://www.suse.com/security/cve/CVE-2017-13134.html

https://www.suse.com/security/cve/CVE-2017-13769.html

https://www.suse.com/security/cve/CVE-2017-14138.html

https://www.suse.com/security/cve/CVE-2017-14172.html

https://www.suse.com/security/cve/CVE-2017-14173.html

https://www.suse.com/security/cve/CVE-2017-14175.html

https://www.suse.com/security/cve/CVE-2017-14341.html

https://www.suse.com/security/cve/CVE-2017-14342.html

https://www.suse.com/security/cve/CVE-2017-14531.html

https://www.suse.com/security/cve/CVE-2017-14607.html

https://www.suse.com/security/cve/CVE-2017-14682.html

https://www.suse.com/security/cve/CVE-2017-14733.html

https://www.suse.com/security/cve/CVE-2017-14989.html

https://www.suse.com/security/cve/CVE-2017-15217.html

https://www.suse.com/security/cve/CVE-2017-15930.html

https://www.suse.com/security/cve/CVE-2017-16545.html

https://www.suse.com/security/cve/CVE-2017-16546.html

https://www.suse.com/security/cve/CVE-2017-16669.html

https://bugzilla.suse.com/1048457

https://bugzilla.suse.com/1049796

https://bugzilla.suse.com/1050083

https://bugzilla.suse.com/1050116

https://bugzilla.suse.com/1050139

https://bugzilla.suse.com/1050632

https://bugzilla.suse.com/1051441

https://bugzilla.suse.com/1051847

https://bugzilla.suse.com/1052450

https://bugzilla.suse.com/1052553

https://bugzilla.suse.com/1052689

https://bugzilla.suse.com/1052744

https://bugzilla.suse.com/1052758

https://bugzilla.suse.com/1052764

https://bugzilla.suse.com/1054757

https://bugzilla.suse.com/1055214

https://bugzilla.suse.com/1056432

https://bugzilla.suse.com/1057157

https://bugzilla.suse.com/1057719

https://bugzilla.suse.com/1057729

https://bugzilla.suse.com/1057730

https://bugzilla.suse.com/1058485

https://bugzilla.suse.com/1058637

https://bugzilla.suse.com/1059666

https://bugzilla.suse.com/1059778

https://bugzilla.suse.com/1060176

https://bugzilla.suse.com/1060577

https://bugzilla.suse.com/1061254

https://bugzilla.suse.com/1062750

https://bugzilla.suse.com/1066003

https://bugzilla.suse.com/1067181

https://bugzilla.suse.com/1067184

https://bugzilla.suse.com/1067409

Severity
Announcement ID: SUSE-SU-2017:3388-1
Rating: important

Related News